ryantig / grepcidrLinks
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitrary networks
☆27Updated last year
Alternatives and similar repositories for grepcidr
Users that are interested in grepcidr are comparing it to the libraries listed below
Sorting:
- ☆17Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- ☆15Updated 3 years ago
- ☆30Updated 5 months ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated 2 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆86Updated 8 months ago
- ☆17Updated 4 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆24Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆69Updated last year
- ☆20Updated last year
- ☆48Updated 4 months ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 7 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Osquery Packs we use for customer security hardening☆12Updated 7 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- THC "R U There" network discovery tool☆28Updated 5 years ago